Analysis
-
max time kernel
143s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
13-01-2023 16:49
Behavioral task
behavioral1
Sample
154de23ef3f3e9d60f16f372438bbb21.exe
Resource
win7-20220812-en
General
-
Target
154de23ef3f3e9d60f16f372438bbb21.exe
-
Size
32KB
-
MD5
154de23ef3f3e9d60f16f372438bbb21
-
SHA1
3746e1c08cb1a5d1e6ab027171f2225acf1a8f97
-
SHA256
8688010ffa07da1ff2e930bc2ad3035f87157794538c8356d324459c9968d0f9
-
SHA512
e9f7580f26fd1808202c9ae6d628f2db2d6d7b83c7da1aca54dedf7bbc2f265d0a9e1bfc56de3e80833fbc35820029ba9f735c05ad0466d8799e10507a605f8d
-
SSDEEP
768:XEda2pzI7icyFK4JP7YSud6gfzsUwdgug5oJa2crh:XEdI7icyFvPVoGgX5o
Malware Config
Extracted
systembc
95.161.131.6:4001
45.153.240.152:4001
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
dibotw.exepid process 996 dibotw.exe -
Drops file in Windows directory 2 IoCs
Processes:
154de23ef3f3e9d60f16f372438bbb21.exedescription ioc process File created C:\Windows\Tasks\dibotw.job 154de23ef3f3e9d60f16f372438bbb21.exe File opened for modification C:\Windows\Tasks\dibotw.job 154de23ef3f3e9d60f16f372438bbb21.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
154de23ef3f3e9d60f16f372438bbb21.exepid process 1372 154de23ef3f3e9d60f16f372438bbb21.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
taskeng.exedescription pid process target process PID 1488 wrote to memory of 996 1488 taskeng.exe dibotw.exe PID 1488 wrote to memory of 996 1488 taskeng.exe dibotw.exe PID 1488 wrote to memory of 996 1488 taskeng.exe dibotw.exe PID 1488 wrote to memory of 996 1488 taskeng.exe dibotw.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\154de23ef3f3e9d60f16f372438bbb21.exe"C:\Users\Admin\AppData\Local\Temp\154de23ef3f3e9d60f16f372438bbb21.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
PID:1372
-
C:\Windows\system32\taskeng.exetaskeng.exe {D474DD0E-36F7-4CB6-8245-B3BB176C4BEB} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:1488 -
C:\ProgramData\cixcgrl\dibotw.exeC:\ProgramData\cixcgrl\dibotw.exe start2⤵
- Executes dropped EXE
PID:996
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
32KB
MD5154de23ef3f3e9d60f16f372438bbb21
SHA13746e1c08cb1a5d1e6ab027171f2225acf1a8f97
SHA2568688010ffa07da1ff2e930bc2ad3035f87157794538c8356d324459c9968d0f9
SHA512e9f7580f26fd1808202c9ae6d628f2db2d6d7b83c7da1aca54dedf7bbc2f265d0a9e1bfc56de3e80833fbc35820029ba9f735c05ad0466d8799e10507a605f8d
-
Filesize
32KB
MD5154de23ef3f3e9d60f16f372438bbb21
SHA13746e1c08cb1a5d1e6ab027171f2225acf1a8f97
SHA2568688010ffa07da1ff2e930bc2ad3035f87157794538c8356d324459c9968d0f9
SHA512e9f7580f26fd1808202c9ae6d628f2db2d6d7b83c7da1aca54dedf7bbc2f265d0a9e1bfc56de3e80833fbc35820029ba9f735c05ad0466d8799e10507a605f8d